How to use GNU Privacy Guard / GnuPG / GPG / PGP to encrypt email and data

Okay… on this blog, we explained the finer details of GNU Privacy Guard or GPG or GnuPG or PGP. Activities that are required to be performed were explained in detail with the commands to perform them.

However, you would still not be able to connect the dots, without this grand overview of GNU Privacy Guard and how it works. The below diagram shows how you can work with GnuPG or GNU Privacy Guard or GPG or PGP over the life-cycle of your keys.

The GNU Privacy Guard Cycle (Click on the boxes for more information)
Blue boxes represent routine usage operations

The GNU Privacy Guard Cycle

How to revoke a GnuPG / GPG key in Linux K-9 eMail client for Android and APG for GPG (PGP) encryption How to add GnuPG / GPG key ID to the Evolution email client in Linux and use it How to receive other people’s GnuPG / PGP public key from a key server into your key ring How to send GPG public key to a PGP key server How to generate a revocation certificate for your GnuPG / GPG key How to export your private key to an ASCII / text file in GnuPG How to export your public key to an ASCII / text file in GnuPG How to list GnuPG or GPG secret keys How to list GnuPG or GPG public keys How to create a GNU Privacy Guard (GPG) GnuPG key pair for yourself

Leave a Reply

  

  

  

Blue Captcha Image
Refresh

*

May 2019
M T W T F S S
« Feb    
 12345
6789101112
13141516171819
20212223242526
2728293031